=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== portsentry-1.2/portsentry_io.c-101- portsentry-1.2/portsentry_io.c:102: ipAddr = inet_addr(ignoreAddr); portsentry-1.2/portsentry_io.c:103: targetAddr = inet_addr(target); portsentry-1.2/portsentry_io.c-104- netmaskAddr = htonl (0xFFFFFFFF << (32 - ignoreNetmaskBits)); ############################################## portsentry-1.2/portsentry_io.c-473- portsentry-1.2/portsentry_io.c:474: CleanIpAddr (cleanAddr, target); portsentry-1.2/portsentry_io.c-475- snprintf(portString, MAXBUF, "%d", port); ############################################## portsentry-1.2/portsentry_io.c-537- portsentry-1.2/portsentry_io.c:538: CleanIpAddr (cleanAddr, target); portsentry-1.2/portsentry_io.c-539- snprintf(portString, MAXBUF, "%d", port); ############################################## portsentry-1.2/portsentry_io.c-596- portsentry-1.2/portsentry_io.c:597: CleanIpAddr (cleanAddr, target); portsentry-1.2/portsentry_io.c-598- ############################################## portsentry-1.2/portsentry_util.c-55-char * portsentry-1.2/portsentry_util.c:56:CleanIpAddr (char *cleanAddr, const char *dirtyAddr) portsentry-1.2/portsentry_util.c-57-{ ############################################## portsentry-1.2/portsentry_util.c-132- portsentry-1.2/portsentry_util.c:133: hostPtr = gethostbyaddr ((char *) &addr.s_addr, sizeof (addr.s_addr), AF_INET); portsentry-1.2/portsentry_util.c-134- if (hostPtr != NULL) ############################################## portsentry-1.2/portsentry_util.h-25-char * SafeStrncpy (char *, const char *, size_t ); portsentry-1.2/portsentry_util.h:26:char * CleanIpAddr (char *, const char *); portsentry-1.2/portsentry_util.h-27-int CleanAndResolve (char *, const char *); ############################################## portsentry-1.2/ignore.csh-50-if ($OS == "Linux") then portsentry-1.2/ignore.csh:51: foreach i ( `ifconfig -a | grep inet | awk '{print $2}' | sed 's/addr://'` ) portsentry-1.2/ignore.csh-52- echo $i >> $SENTRYDIR/$TMPFILE ############################################## portsentry-1.2/ignore.csh-59- $OS == "SunOS 4.x" || $OS == "OSF1" || $OS == "IRIX") then portsentry-1.2/ignore.csh:60: foreach i ( `ifconfig -a | grep inet | awk '{print $2}'` ) portsentry-1.2/ignore.csh-61- echo $i >> $SENTRYDIR/$TMPFILE ############################################## portsentry-1.2/debian/examples/kill_cmd-9-MODE=${3/[sa]/} # get rid of s and a portsentry-1.2/debian/examples/kill_cmd:10:SERVICEINFO=`grep "[[:space:]]$2/$MODE" /etc/services` portsentry-1.2/debian/examples/kill_cmd-11- portsentry-1.2/debian/examples/kill_cmd-12-# can we get some info about the attacker? portsentry-1.2/debian/examples/kill_cmd:13:FINGERINFO=`/usr/sbin/safe_finger -l @$1 2>/dev/null` portsentry-1.2/debian/examples/kill_cmd-14- ############################################## portsentry-1.2/debian/examples/scan-detect-29-Portsentry has detected a portscan at $time portsentry-1.2/debian/examples/scan-detect:30:from the host `$target' and the port `$port'. portsentry-1.2/debian/examples/scan-detect-31- ############################################## portsentry-1.2/debian/scripts/portsentry-build-ignore-file-48-close( $th ) || die "Cannot close $tfname: $!\n"; portsentry-1.2/debian/scripts/portsentry-build-ignore-file:49:system( "/bin/mv","-f", $tfname, $ignore_file) && die "moving $ignore_file into place failed: $?\n"; portsentry-1.2/debian/scripts/portsentry-build-ignore-file-50-chmod( 0644, $ignore_file );